Ciphers

Results: 800



#Item
81

On the Security of Symmetric Key Ciphers against Quantum Adversaries M. Kaplan∗ G. Leurent†

Add to Reading List

Source URL: 2015.qcrypt.net

Language: English - Date: 2015-09-22 01:47:27
    82

    HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers Sourav Sen Gupta1? , Anupam Chattopadhyay2 , and Ayesha Khalid2 1 Applied Statistics Unit, Indian Statistical Institute, Kolkata, India

    Add to Reading List

    Source URL: www.souravsengupta.com

    Language: English - Date: 2014-09-05 01:18:36
      83

      Dietary Recommendations for Lightweight Block Ciphers: Power, Energy and Area Analysis of Recently Developed Architectures Lejla Batina, Amitabh Das, Barış Ege, Elif Bilge Kavun, Nele Mentens,

      Add to Reading List

      Source URL: rfidsec2013.iaik.tugraz.at

      Language: English - Date: 2013-08-02 05:37:17
        84

        Introduction Early Applications to Block Ciphers Preimages of Hash Functions

        Add to Reading List

        Source URL: web.spms.ntu.edu.sg

        Language: English - Date: 2012-08-26 19:26:44
          85

          Attacks on Stream Ciphers: A Perspective

          Add to Reading List

          Source URL: web.spms.ntu.edu.sg

          Language: English - Date: 2012-03-13 12:15:13
            86

            Stream Ciphers and Block Ciphers Cryptography I – Fall 2013 Ruben Niederhagen September 19th, 2013

            Add to Reading List

            Source URL: polycephaly.org

            Language: English - Date: 2014-04-30 06:43:42
              87Cryptography / Advantage / Block cipher / Pseudorandom permutation / Feistel cipher / Cardinal number / One-way compression function / Index of cryptography articles

              Efficient and Optimally Secure Key-Length Extension for Block Ciphers via Randomized Cascading? Peter Gaˇzi1,2 and Stefano Tessaro3,4 1 Department of Computer Science, Comenius University, Bratislava, Slovakia

              Add to Reading List

              Source URL: pub.ist.ac.at

              Language: English - Date: 2014-06-19 17:26:59
              88

              FSE 2011, February, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW

              Add to Reading List

              Source URL: fse2011.mat.dtu.dk

              Language: English - Date: 2011-02-12 03:37:52
                89Internet Standards / Message authentication codes / Advanced Encryption Standard / Poly1305 / Stream ciphers / Cryptographic software / Salsa20 / Daniel J. Bernstein / Cipher suite / Authenticated encryption / LibreSSL / Transport Layer Security

                ChaCha20 and Poly1305 Cipher Suites for TLS Adam Langley Wan-Teh Chang Outline

                Add to Reading List

                Source URL: www.ietf.org

                Language: English - Date: 2013-11-05 13:13:43
                90Cryptography / Stream ciphers / Cryptographic hash functions / Message authentication codes / VEST / A5/1 / Data Encryption Standard / Block cipher modes of operation / Confusion and diffusion / Crypt / Rabbit / Key size

                The Stream Cipher Rabbit1 Martin Boesgaard Mette Vesterager Erik Zenner

                Add to Reading List

                Source URL: www.ecrypt.eu.org

                Language: English - Date: 2007-03-29 16:18:56
                UPDATE